Welcome, Guest. Please login or register.
April 28, 2024, 10:50:10 AM

Login with username, password and session length

Search:     Advanced search
we're back, baby
*
Home Help Search Login Register
f13.net  |  f13.net General Forums  |  General Discussion  |  Serious Business  |  Topic: Die McAfee...Die. 0 Members and 1 Guest are viewing this topic.
Pages: 1 [2] Go Down Print
Author Topic: Die McAfee...Die.  (Read 12744 times)
Fraeg
Terracotta Army
Posts: 1015

Mad skills with the rod.


Reply #35 on: April 28, 2010, 06:02:15 PM

I use Kaspersky.

 Mob

Nothing good to say about that one.  The best thing it ever did was detect its own installer as malware and delete it.

hmm what do you use?  I haven't had any issues with Kaspersky

"There is dignity and deep satisfaction in facing life and death without the comfort of heaven or the fear of hell and in sailing toward the great abyss with a smile."
Samwise
Moderator
Posts: 19225

sentient yeast infection


WWW
Reply #36 on: April 28, 2010, 10:36:42 PM

I use AVG at home.  Admittedly I only have experience with the "enterprise" mode of Kaspersky that slaves every machine to a central server and won't let you set your own exclusions or recover quarantined files.  Its propensity to flag just about ANY executable not on your whitelist as malware and quarantine it without prompting you makes this mode... frustrating.

"I have not actually recommended many games, and I'll go on the record here saying my track record is probably best in the industry." - schild
Fraeg
Terracotta Army
Posts: 1015

Mad skills with the rod.


Reply #37 on: April 29, 2010, 06:43:01 PM

ahh I have the personal/home/whatever version and it doesn't have the issues that you describe in my experience.

"There is dignity and deep satisfaction in facing life and death without the comfort of heaven or the fear of hell and in sailing toward the great abyss with a smile."
eldaec
Terracotta Army
Posts: 11842


Reply #38 on: May 02, 2010, 11:10:08 AM

Currently have AVG because it came installed on my laptop.

But before that I used 'not downloading/opening obvious malware and updating windows occasionally ffs'. Got to say, NDOM&UWOFFS worked just fine for years.

I'm not convinced AV software is either necessary or effective in stopping viruses tbh.


I'm edgy and controversial you see.

"People will not assume that what they read on the internet is trustworthy or that it carries any particular ­assurance or accuracy" - Lord Leveson
"Hyperbole is a cancer" - Lakov Sanite
Lantyssa
Terracotta Army
Posts: 20848


Reply #39 on: May 02, 2010, 12:58:46 PM

I'm not convinced AV software is either necessary or effective in stopping viruses tbh.
In a multi-user environment?  It makes a huge difference.  In such an environment where you can't control a good number of the machines?  A life-saver.

Hahahaha!  I'm really good at this!
bhodi
Moderator
Posts: 6817

No lie.


Reply #40 on: May 02, 2010, 07:06:15 PM

Scan on create or modify is fine. Scan on access is not. Everyone uses scan on access, and I can't figure out why. All it does is slow the machine to a crawl for little additional protection.
Selby
Terracotta Army
Posts: 2963


Reply #41 on: May 02, 2010, 08:00:14 PM

All it does is slow the machine to a crawl for little additional protection.
Thank you!  I haven't heard a good argument yet for it.  Or those giant deep scans they do after boot-up that slow you to a crawl for 30m.  Sorry guys, if a virus is a boot-up virus it's ALREADY loaded by the time the AV program starts it's deep scan...
Ingmar
Terracotta Army
Posts: 19280

Auto Assault Affectionado


Reply #42 on: May 05, 2010, 12:34:16 AM

Scan on create or modify is fine. Scan on access is not. Everyone uses scan on access, and I can't figure out why. All it does is slow the machine to a crawl for little additional protection.

If you're not scanning on execute you might as well not be scanning at all.

EDIT: Of course if you're in an environment with no network shares or whatever you don't need it, but you can get into a heap of trouble pretty quickly accessing files on a windows share somewhere without on-access scanning.
« Last Edit: May 05, 2010, 12:36:56 AM by Ingmar »

The Transcendent One: AH... THE ROGUE CONSTRUCT.
Nordom: Sense of closure: imminent.
bhodi
Moderator
Posts: 6817

No lie.


Reply #43 on: May 05, 2010, 11:15:39 AM

If you're not scanning on execute you might as well not be scanning at all.
Explain this. Please explain to me how a virus can get into an enterprise if all desktops are running scan on create or modify.

Then, explain to me how it isn't an extreme edge case.

Finally, explain how scanning on modify/create is equivalent to not scanning at all.
ezrast
Terracotta Army
Posts: 2125


WWW
Reply #44 on: May 05, 2010, 11:46:57 AM

you can get into a heap of trouble pretty quickly accessing files on a windows share somewhere without on-access scanning.
Or files on a CD you brought in from home, or that are already on someone's system but were only added to your AV's virus database yesterday. For home users, scanning everything all the time doesn't make much sense, but I imagine most revenue from AV comes from corporate licenses and in a large, corporate network, it sort of makes sense to be as aniseptic as possible.

Case in point, my school has used two different solutions to force students to install AV before connecting to the interwebs (one from Cisco, one from Bradford). Neither one has actually stopped me from connecting to the interwebs without AV.
Ingmar
Terracotta Army
Posts: 19280

Auto Assault Affectionado


Reply #45 on: May 05, 2010, 11:50:00 AM

If you're not scanning on execute you might as well not be scanning at all.
Explain this. Please explain to me how a virus can get into an enterprise if all desktops are running scan on create or modify.

Then, explain to me how it isn't an extreme edge case.

Finally, explain how scanning on modify/create is equivalent to not scanning at all.

Thumb drive. Guest laptop from a vendor. CD from home as ezrast mentions. There are a *lot* of paths. And if you're not scanning on access, any file run from a source like that can be executed and get itself into memory without being scanned. And then you're fucked.

EDIT: Guest machines and stuff users tote around on their thumb drives between home and work are the most common source of infections in enterprises AFAIK.
« Last Edit: May 05, 2010, 11:52:13 AM by Ingmar »

The Transcendent One: AH... THE ROGUE CONSTRUCT.
Nordom: Sense of closure: imminent.
Minvaren
Terracotta Army
Posts: 1676


Reply #46 on: May 05, 2010, 12:19:58 PM

Thumb drive. Guest laptop from a vendor. CD from home as ezrast mentions. There are a *lot* of paths. And if you're not scanning on access, any file run from a source like that can be executed and get itself into memory without being scanned. And then you're fucked.

EDIT: Guest machines and stuff users tote around on their thumb drives between home and work are the most common source of infections in enterprises AFAIK.

if the virus is executed from a thumb drive or CD drive, doesn't it have to install itself somewhere to be able to survive a reboot?  One would hope that the heuristics on whatever AV protection you're running will check memory when it cleans the new copy of itself it made.

"There are many things of which a wise man might wish to remain ignorant." - Ralph Waldo Emerson
bhodi
Moderator
Posts: 6817

No lie.


Reply #47 on: May 05, 2010, 12:20:22 PM

Thumb drive. Guest laptop from a vendor. CD from home as ezrast mentions. There are a *lot* of paths. And if you're not scanning on access, any file run from a source like that can be executed and get itself into memory without being scanned. And then you're fucked.

EDIT: Guest machines and stuff users tote around on their thumb drives between home and work are the most common source of infections in enterprises AFAIK.
Most enterprises disable thumb drive reading these days, but that aside, you can't spread the virus and it will be picked up in a regular daily scan. Again, I'm not seeing a problem when compared with the HUGE delay and slowdown associated with tunneling your entire I/O through a virus scanner.

And, of course, the idea of scanning on modify/create is equivalent to not scanning at all is complete hyperbole.
Ingmar
Terracotta Army
Posts: 19280

Auto Assault Affectionado


Reply #48 on: May 05, 2010, 12:34:01 PM

Thumb drive. Guest laptop from a vendor. CD from home as ezrast mentions. There are a *lot* of paths. And if you're not scanning on access, any file run from a source like that can be executed and get itself into memory without being scanned. And then you're fucked.

EDIT: Guest machines and stuff users tote around on their thumb drives between home and work are the most common source of infections in enterprises AFAIK.

if the virus is executed from a thumb drive or CD drive, doesn't it have to install itself somewhere to be able to survive a reboot?  One would hope that the heuristics on whatever AV protection you're running will check memory when it cleans the new copy of itself it made.

Typically once a halfway-competent virus is running in memory, it will interfere with the virus software on the machine - I've seen this a number of times.
Thumb drive. Guest laptop from a vendor. CD from home as ezrast mentions. There are a *lot* of paths. And if you're not scanning on access, any file run from a source like that can be executed and get itself into memory without being scanned. And then you're fucked.

EDIT: Guest machines and stuff users tote around on their thumb drives between home and work are the most common source of infections in enterprises AFAIK.
Most enterprises disable thumb drive reading these days, but that aside, you can't spread the virus and it will be picked up in a regular daily scan. Again, I'm not seeing a problem when compared with the HUGE delay and slowdown associated with tunneling your entire I/O through a virus scanner.

And, of course, the idea of scanning on modify/create is equivalent to not scanning at all is complete hyperbole.

The virus not spreading beyond the one machine it infects is usually little comfort to the user who just got their machine nuked, or the IT guy who gets stuck spending hours rebuilding it. Plus there's always the risk that important data on that machine is destroyed or compromised in the process.

As long as your virus software doesn't suck (I am looking at you Symantec) for the vast majority of users the performance hit will not be noticeable. Yes, you don't want it to be running for people running certain operations that use a million little files and the like, but the more sterile the environment the better otherwise. We're running Sophos in-house now and the performance problems we saw with Symantec have completely vanished.
« Last Edit: May 05, 2010, 12:39:11 PM by Ingmar »

The Transcendent One: AH... THE ROGUE CONSTRUCT.
Nordom: Sense of closure: imminent.
KallDrexx
Terracotta Army
Posts: 3510


Reply #49 on: May 05, 2010, 12:38:18 PM

Most enterprises disable thumb drive reading these days, but that aside, you can't spread the virus and it will be picked up in a regular daily scan. Again, I'm not seeing a problem when compared with the HUGE delay and slowdown associated with tunneling your entire I/O through a virus scanner.


Unless they run the virus off of the thumb drive, in which only on execute checks would find it.
bhodi
Moderator
Posts: 6817

No lie.


Reply #50 on: May 05, 2010, 12:41:24 PM

Typically once a halfway-competent virus is running in memory, it will interfere with the virus software on the machine - I've seen this a number of times.
And typically, 75% of viruses in the wild go right through the antivirus initially, since there are no definitions because the AV people are forever playing catch-up in a fast moving system. It's really just a false sense of security.

Unless they run the virus off of the thumb drive, in which only on execute checks would find it.
Who carries thumb drives around to large numbers of machines in your enterprise? Other than sysadmins, who if are all competent actually scan them.

Also, doesn't modern AV software automatically scan any usb drives that are plugged in anyway?
« Last Edit: May 05, 2010, 12:43:50 PM by bhodi »
bhodi
Moderator
Posts: 6817

No lie.


Reply #51 on: May 05, 2010, 12:59:38 PM

The virus not spreading beyond the one machine it infects is usually little comfort to the user who just got their machine nuked, or the IT guy who gets stuck spending hours rebuilding it. Plus there's always the risk that important data on that machine is destroyed or compromised in the process.

As long as your virus software doesn't suck (I am looking at you Symantec) for the vast majority of users the performance hit will not be noticeable. Yes, you don't want it to be running for people running certain operations that use a million little files and the like, but the more sterile the environment the better otherwise. We're running Sophos in-house now and the performance problems we saw with Symantec have completely vanished.
I've never found virus software that doesn't suck. Symantec and Mcaffee are the two I've used professionally, and those two are the largest in the business, so you might as well translate that sentence into "As long as you aren't using industry standard antivurus software, the vast majority of users will not find the performance hit noticeable" which again is a ridiculous statement.

No user should ever, EVER have important data on their desktop. Ever. It should be on some type of shared drive that is backed up (and scanned!) periodically. Come on. You know this. I know this. Everyone knows this. Users have to be cajoled into following it, but it's simple risk management / disaster recovery stuff. The same goes for having a fast destop imaging procedure. Getting hit with a virus (that can't be removed) or one that trashes someone's machine, and having to do a standard flatten and reinstall, should take no more than 3 hours. Tops. Ideally, you should be able to netboot or stick a ghost/baremetal CD into the drive and restore from there.
Ingmar
Terracotta Army
Posts: 19280

Auto Assault Affectionado


Reply #52 on: May 05, 2010, 02:31:59 PM

No user should ever, EVER have important data on their desktop. Ever.

Sure, in a perfect world. I know how dumb my users are, though, so I'm going to leave that on-access scanning running.  Ohhhhh, I see.

I'm going to stand by the statement that your average finance/sales/marketing type user isn't going to notice the little amount of overhead that our current AV solution (Sophos) takes on a modern machine. Most of them didn't even notice it from Symantec, which is much more bloated and intrusive by comparison. Yes, some guy checking 10,000 little files into or out of source control is going to have something legitimate to bitch about.

EDIT: It boils down to a philosophy issue, our company takes a 'don't trust the user/full lockdown' approach to this particular issue.

EDIT 2: If I could talk them into not trusting users with thumb drives or local admin rights, we could probably lighten up on this a little more, but...
« Last Edit: May 05, 2010, 02:37:22 PM by Ingmar »

The Transcendent One: AH... THE ROGUE CONSTRUCT.
Nordom: Sense of closure: imminent.
Samwise
Moderator
Posts: 19225

sentient yeast infection


WWW
Reply #53 on: May 05, 2010, 03:35:05 PM

Yes, some guy checking 10,000 little files into or out of source control is going to have something legitimate to bitch about.
* Samwise waves.

"I have not actually recommended many games, and I'll go on the record here saying my track record is probably best in the industry." - schild
Merusk
Terracotta Army
Posts: 27449

Badge Whore


Reply #54 on: May 05, 2010, 05:59:12 PM

No user should ever, EVER have important data on their desktop. Ever.

What magical mystery world do you live in where all notebooks/ laptops have wireless access all the time to save things to the network?  Because our salespeople, builders and Realtors sure don't have that luxury.

The past cannot be changed. The future is yet within your power.
bhodi
Moderator
Posts: 6817

No lie.


Reply #55 on: May 05, 2010, 08:05:19 PM

No user should ever, EVER have important data on their desktop. Ever.

What magical mystery world do you live in where all notebooks/ laptops have wireless access all the time to save things to the network?  Because our salespeople, builders and Realtors sure don't have that luxury.
Uh, a cubicle office? Where if people need to do work from home on their laptops or something, they VPN in and can access shared drives?

What happens if their laptop gets dropped? All their data is gone? Yeech.
Merusk
Terracotta Army
Posts: 27449

Badge Whore


Reply #56 on: May 05, 2010, 08:10:12 PM

Next time you're at a stranger's house or one without utilities or on a construction site, let me know how that VPN goes.

Yes, they lose the data if they drop them. Yes, it happens. This is why they also have thumb drives.   I'm just happy some of the other office folks managed to talk the execs out of buying iPads for all of the field personnel.  That would have worked out JUST GREAT.

The past cannot be changed. The future is yet within your power.
bhodi
Moderator
Posts: 6817

No lie.


Reply #57 on: May 05, 2010, 08:13:32 PM

Next time you're at a stranger's house or one without utilities or on a construction site, let me know how that VPN goes.

Yes, they lose the data if they drop them. Yes, it happens. This is why they also have thumb drives.   I'm just happy some of the other office folks managed to talk the execs out of buying iPads for all of the field personnel.  That would have worked out JUST GREAT.
Time to get a phone tethering option!

But seriously, yours is a edge case, there are far, far more offices with stationary personnel.
Merusk
Terracotta Army
Posts: 27449

Badge Whore


Reply #58 on: May 05, 2010, 08:26:44 PM

Mine is an edge case in an industry that helped bring the economy to its knees Grin.   I'm not sure if big commercial sites put up wireless connections or if they use 3g for their stuff.   I can't imagine biologists or anyone else working outside does the same.

The past cannot be changed. The future is yet within your power.
Slayerik
Terracotta Army
Posts: 4868

Victim: Sirius Maximus


Reply #59 on: May 06, 2010, 09:07:54 AM

I work with Neurosurgeons and some of the smartest people you'll ever meet. I still have to try to recover data off laptops because "their whole life is on there". Ok, maybe they aren't the smartest people you'll ever meet :)

The thumb drive is an awesome little backup tool. When I can't get my users to backup to their shared drives, or have too much data for there, I have them thumb it/USB hard drive it. I also warn them that the little bastards can die at any moment and to not put "your entire life on them".

For virus scanning, I personally don't use it at home, and have never been burned. It's bullshit.

"I have more qualifications than Jesus and earn more than this whole board put together.  My ego is huge and my modesty non-existant." -Ironwood
Merusk
Terracotta Army
Posts: 27449

Badge Whore


Reply #60 on: May 06, 2010, 03:17:55 PM

Anti-Virus software isn't for 90% of the people on this board.  It's for the 70% of the population that still looks at them as magic boxes and falls for basic shit like links that say www.disney.com but go to goatse.cx.   These are the majority of your users and you KNOW this.

The past cannot be changed. The future is yet within your power.
proudft
Terracotta Army
Posts: 1228


Reply #61 on: May 10, 2010, 09:17:58 AM

Aw, your www.disney.com link actually goes to www.disney.com.   Oh ho ho ho. Reallllly?

I haven't had a virus since the days of floppy-disk swapping in, hrm, lemme think... 1990 or '91.  I did have a hard drive crash last year that totally sucked and made me actually start backing stuff up since it cost several arms and legs to recover the drive.   This old fogey was not used to hard drives just dying without even a whimper or a chuggachugga.   Well, lesson learned.
« Last Edit: May 10, 2010, 09:20:38 AM by proudft »
MahrinSkel
Terracotta Army
Posts: 10857

When she crossed over, she was just a ship. But when she came back... she was bullshit!


Reply #62 on: May 10, 2010, 01:26:39 PM

I think it's a rule that any links to www.disney.com have to actually link to Goatse.

--Dave (that site is actually work-safe now)

--Signature Unclear
Merusk
Terracotta Army
Posts: 27449

Badge Whore


Reply #63 on: May 10, 2010, 03:50:24 PM

Heh, board auto-linked it. I just typed in the address but no link.

The past cannot be changed. The future is yet within your power.
Pages: 1 [2] Go Up Print 
f13.net  |  f13.net General Forums  |  General Discussion  |  Serious Business  |  Topic: Die McAfee...Die.  
Jump to:  

Powered by SMF 1.1.10 | SMF © 2006-2009, Simple Machines LLC